• 제목/요약/키워드: evidence information

검색결과 2,260건 처리시간 0.024초

BARRIER TO ELECTRONIC KNOWLEDGE REPOSITORY SUCCESS: INFORMATION OVERLOAD AND CONTRIBUTION OVERLOAD

  • Bock, Gee-Woo;Kang, Youn-Jung
    • 한국경영정보학회:학술대회논문집
    • /
    • 한국경영정보학회 2007년도 추계학술대회
    • /
    • pp.284-293
    • /
    • 2007
  • In the present competitive organizational environment more organizations are implementing knowledge management initiatives to gain strategic advantage. One such initiative is that of implementing electronic knowledge repositories (EKR) which often leads to a rapid increase in the quantity of information employees have to process daily; raising concerns of employees being overloaded. This is especially true for current EKRs using distributive technology, enabling customizable individual workspaces which can result in loose knowledge structures. This paper identifies a new type of information overload (IO), extending the concept as occurring in both knowledge seekers and contributors and uses cognitive dissonance theory to provide evidence that IO can change employees' perception of EKR usage. This research paper provides the first empirical evidence that overload has no sufficient affect on EKR continuance intention directly, but has significant negative affect on the two main success measures; perceived usefulness and satisfaction of the system.

  • PDF

Business Process Reengineering of an Information Exchange Management System for a Nationwide Cyber Threat Intelligence

  • Pramadi, Yogha Restu;Rosmansyah, Yousep;Kim, Myonghee;Park, Man-Gon
    • 한국멀티미디어학회논문지
    • /
    • 제20권2호
    • /
    • pp.279-288
    • /
    • 2017
  • Nowadays, nations cyber security capabilities play an important role in a nation's defense. Security-critical infrastructures such as national defenses, public services, and financial services are now exposed to Advanced Persistent Threats (APT) and their resistance to such attacks effects the nations stability. Currently Cyber Threat Intelligence (CTI) is widely used by organizations to mitigate and deter APT for its ability to proactively protect their assets by using evidence-based knowledge. The evidence-based knowledge information can be exchanged among organizations and used by the receiving party to strengthen their cyber security management. This paper will discuss on the business process reengineering of the CTI information exchange management for a nationwide scaled control and governance by the government to better protect their national information security assets.

간호대학생을 위한 간호정보활용역량 교육프로그램 개발 및 효과 검증 (Development and effects of a nursing information literacy competency education program for undergraduate nursing students)

  • 조민정;구미옥
    • 한국간호교육학회지
    • /
    • 제27권2호
    • /
    • pp.210-222
    • /
    • 2021
  • Purpose: This study was conducted to develop and test the effects of a nursing information literacy competency education program for undergraduate nursing students. Methods: A non-equivalent control group pretest-posttest design was used. The subjects consisted of 42 sophomore undergraduate nursing students who had completed a fundamental nursing course (experimental group: n=21, control group n=21). The nursing information literacy competency education program consisted of 8 steps in 8 sessions, taught over 4 weeks, which was 20 hours in total. Data were collected between January 23 and March 14, 2019 and were analyzed using Chi-square test, Fisher's exact test, t-test, paired t-test, and repeated measure ANOVA with SPSS/WIN 23.0. Results: Significant differences were shown between the experimental and control groups regarding nursing information literacy competency (F=91.74, p<.001), problem-solving ability (F=52.43, p<.001), self-directed learning ability (F=36.61, p<.001), and evidence-based practice competency (F=59.66, p<.001). Conclusion: The nursing information literacy competency education program was effective in improving the nursing information literacy competency, problem-solving ability, self-directed learning ability, and evidence-based practice competency of nursing students. Hence, we recommend the nursing information literacy education program will be included as an independent course in the nursing curriculum for undergraduate nursing students to promote a needed proficiency in nursing information literacy competency.

안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구 (Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System)

  • 남기훈;공성현;석병진;이창훈
    • 정보보호학회논문지
    • /
    • 제28권1호
    • /
    • pp.111-122
    • /
    • 2018
  • 안드로이드 운영체제의 서드파티 애플리케이션들은 사용자의 계정 및 개인정보에 대한 접근 권한을 획득하기 위해 OAuth 프로토콜을 이용하여 계정 정보 제공자들로부터 사용자의 크리덴셜 및 사용자의 자원에 접근할 수 있는 권한을 내포하는 접근 토큰을 전달받는다. 이러한 크리덴셜 및 토큰 정보는 안드로이드 운영체제가 제공하는 OAuth 관련 데이터 관리 방식에 의해 기기 내부에 저장되는데, 이 정보가 유출될 경우 공격자는 유출된 크리덴셜 및 토큰 정보를 이용하여 사용자의 계정에 대한 자유로운 로그인 및 데이터 접근이 가능하다. 이러한 특징은 디지털 포렌식 수사관이 증거 데이터를 수집하는 관점에서 피압수자가 사용하는 서비스의 원격지 서버로부터 직접 데이터를 수집하는 것을 가능하게 한다. 원격지에서 수집되는 증거 데이터는 2차적인 영장발부의 토대로 작용함으로써 수집한 디지털 증거의 증거능력을 확보할 수 있기 때문에 피압수자가 안드로이드 기기에서 애플리케이션 삭제 등의 증거 인멸을 시도한 경우 매우 중요한 증거가 될 수 있다. 본 논문에서는 다양한 안드로이드 운영체제 및 기기 환경에서 OAuth 토큰의 관리 현황을 분석하고, 이를 이용하여 다양한 서드파티 애플리케이션의 데이터를 수집하는 방법을 소개한다. 이를 통해 디지털 포렌식 관점에서 피압수자가 사용하는 서비스의 원격지 데이터를 수집함으로써 증거 수집의 영역을 확장할 수 있는 방안을 제안한다.

A Systematic Review of Cervical Cancer Incidence and Mortality in the Pacific Region

  • Obel, J.;Souares, Y.;Hoy, D.;Baravilala, W.;Garland, S.M.;Kjaer, S.K.;Roth, A.
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제15권21호
    • /
    • pp.9433-9437
    • /
    • 2014
  • This study provides the first systematic literature review of cervical cancer incidence and mortality as well as human papillomavirus (HPV) genotype prevalence among women with cervical cancer in the Pacific Island countries and territories. The cervical cancer burden in the Pacific Region is substantial, with age standardized incidence rates ranging from 8.2 to 50.7 and age standardized mortality rate from 2.7 to 23.9 per 100,000 women per year. The HPV genotype distribution suggests that 70-80% of these cancers could be preventable by the currently available bi- or quadrivalent HPV vaccines. There are only few comprehensive studies examining the epidemiology of cervical cancer in this region and no published data have hitherto described the current cervical cancer prevention initiatives in this region.

Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks

  • Zimba, Aaron;Wang, Zhaoshun;Chen, Hongsong;Mulenga, Mwenge
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권6호
    • /
    • pp.3258-3279
    • /
    • 2019
  • Recently, ransomware has earned itself an infamous reputation as a force to reckon with in the cybercrime landscape. However, cybercriminals are adopting other unconventional means to seamlessly attain proceeds of cybercrime with little effort. Cybercriminals are now acquiring cryptocurrencies directly from benign Internet users without the need to extort a ransom from them, as is the case with ransomware. This paper investigates advances in the cryptovirology landscape by examining the state-of-the-art cryptoviral attacks. In our approach, we perform digital autopsy on the malware's source code and execute the different malware variants in a contained sandbox to deduce static and dynamic properties respectively. We examine three cryptoviral attack structures: browser-based crypto mining, memory resident crypto mining and cryptoviral extortion. These attack structures leave a trail of digital forensics evidence when the malware interacts with the file system and generates noise in form of network traffic when communicating with the C2 servers and crypto mining pools. The digital forensics evidence, which essentially are IOCs include network artifacts such as C2 server domains, IPs and cryptographic hash values of the downloaded files apart from the malware hash values. Such evidence can be used as seed into intrusion detection systems for mitigation purposes.

상급 종합병원 간호사의 정보검색능력이 근거기반실무 역량에 미치는 영향 (The Influence of Information Retrieval Skill on Evidence Based Practice Competency in Clinical Nurses)

  • 손연정;김선희;박영수;이수경;이윤미
    • 성인간호학회지
    • /
    • 제24권6호
    • /
    • pp.635-646
    • /
    • 2012
  • Purpose: The purpose of this study was to understand clinical nurses' level of information retrieval skill and its influence on evidence based practice (EBP). Methods: A cross-sectional design was used. Data were collected from a convenient sample of 492 nurses working at 5 university hospitals in Korea. The Data were analyzed using descriptive statistics, t-test, one-way ANOVA, and hierarchical multiple linear regression. Results: The mean score for information retrieval skill and EBP competency were respectively $2.81{\pm}0.64$ and $3.98{\pm}0.86$. Two step hierarchical regression analysis showed that attendance at academic conference (p = .036) and information retrieval skill (p<.001) were significant factors of EBP competency, information retrieval skill explained about 19% of total variance of EBP competency. Conclusion: Nurse need to increased fundamental information retrieval skill for EBP competency. Therefore, it is important to increase nurses' information retrieval skills by tailoring continuing EBP education modules. It would be also advisable to develop centralized systems for the internal dissemination of research findings for the use of nursing staff.

Representing Fuzzy, Uncertain Evidences and Confidence Propagation for Rule-Based System

  • Zhang, Tailing
    • 한국농업기계학회:학술대회논문집
    • /
    • 한국농업기계학회 1993년도 Proceedings of International Conference for Agricultural Machinery and Process Engineering
    • /
    • pp.1254-1263
    • /
    • 1993
  • Representing knowledge uncertainty , aggregating evidence confidences , and propagation uncertainties are three key elements that effect the ability of a rule-based expert system to represent domains with uncertainty . Fuzzy set theory provide a good mathematical tool for representing the vagueness associated with a variable when , as the condition of a rule , it only partially corresponds to the input data. However, the aggregation of ANDed and Ored confidences is not as simple as the intersection and union operators defined for fuzzy set membership. There is, in fact, a certain degree of compensation that occurs when an expert aggregates confidences associated with compound evidence . Further, expert often consider individual evidences to be varying importance , or weight , in their support for a conclusion. This paper presents a flexible approach for evaluating evidence and conclusion confidences. Evidences may be represented as fuzzy or nonfuzzy variables with as associat d degree of certainty . different weight can also be associated degree of certainty. Different weights can also be assigned to the individual condition in determining the confidence of compound evidence . Conclusion confidence is calculated using a modified approach combining the evidence confidence and a rule strength. The techniques developed offer a flexible framework for representing knowledge and propagating uncertainties. This framework has the potention to reflect human aggregation of uncertain information more accurately than simple minimum and maximum operator do.

  • PDF

과학 공학적 실천에 의한 초등학교 과학 교과서 물질 영역의 탐구 활동 분석 (The Analysis of Inquiry Activity in the Material Domain of the Elementary Science Textbook by Science and Engineering Practices)

  • 조성호;임지영;이정아;최근창;전경문
    • 한국초등과학교육학회지:초등과학교육
    • /
    • 제35권2호
    • /
    • pp.181-193
    • /
    • 2016
  • We examined the inquiry activities in the material domain of the elementary science textbooks and experimental workbooks based on 2009 revised curriculum. The analysis framework was SEP (Science and Engineering Practices) - 'Asking questions and defining problems', 'developing and using models', 'planning and carrying out investigations', 'analyzing and interpreting data', 'using mathematics and computational thinking', 'constructing explanations and designing solutions', 'engaging in argument from evidence', and 'obtaining, evaluating, and communicating information'. Sub-SEP of each grade band were also used. The results showed that the $3^{rd}{\sim}5^{th}$ grade science textbooks and workbooks mainly emphasized 'make observations and/or measurements', 'represent data in tables and/or various graphical displays', or 'use evidence to construct or support an explanation or design a solution to a problem' among around 40 sub-SEP. In the case of the inquiry activities for $6^{th}$ grade, majority of sub-SEP included were also only 'collect data to produce data to serve as the basis for evidence to answer scientific questions or test design solutions', 'analyze and interpret data to provide evidence for phenomena' or 'construct a scientific explanation based on valid and reliable evidence obtained from sources'. The type of 'asking questions and defining problems', 'using mathematics and computational thinking' or 'obtaining, evaluating, and communicating information' were little found out of 8 SEP. Educational implications were discussed.

불확실성 처리를 위한 효율적 뎀스터 쉐이퍼 증거병합 방법 (An Efficient Dempster-Shafer Evidence Combination Scheme for Uncertainty Handling)

  • 이계성
    • 한국정보처리학회논문지
    • /
    • 제3권4호
    • /
    • pp.908-914
    • /
    • 1996
  • 많은 전문가 시스템에서 고려되는 중요한 주제 중의 하나인 불확실성 처리에 관한 연구에는 여러 처리 기법들이 있다. 그 중 뎀스터 쉐이퍼 증거병합방법은 그것의 장점과 동시에 계산적 복잡성 때문에 많이 연구되고 있다. 이 논문에서는 뎀스터 쉐이퍼 증거 병합 방법이 갖는 지수적 계산 특성을 해결하는 알고리즘을 개발한다. 두개의 신뢰 함수를 병합함에 있어 가설 집단(frame of discernment)을 두 신뢰함수에 공통되는 부분과 그 나머지로 구분해 계산 비용이 높은 뎀스터 쉐이퍼 병합은 공통부분인, 원래 보다 축소된 가설집단에 적용해 전체 계산 효율을 높이는 효과를 가져오도록 한다. 나머지 부분에 대해서는 병합의 결과가 무관성 요소(irrelevancy fac-tor)라 정의한 특정 상수에 의해 증감되는 선형적인 변화를 갖게되는 성질을 찾아낸다. 공유하는 요소가 없는 부분에 대해서는 병합의 결과가 간단히 이 상수의 곱에 의해 결정되므로 계산적인 효율을 증대시킬 수 있게 된다.

  • PDF